Page 176 - ITU KALEIDOSCOPE, ATLANTA 2019
P. 176
2019 ITU Kaleidoscope Academic Conference
2. PAKE PROTOCOL STANDARDIZATION challenge. In this case, the protocol will end without the
user credentials being exposed to the attacker.
Password-authenticated key exchange (PAKE) protocols
have been defined internationally in Recommendation ITU- When the client authentication-attempt message in a PAKE
T X.1035 [7] and ISO/IEC 11770-4 [8]. PAKE is a protocol is augmented with a user's biometric sample, the
“cryptographic protocol that allows two parties who share PAKE protocol can be extended to provide both mutual
knowledge of a password to mutually authenticate each authentication, and two-factor user identity authentication.
other and establish a shared key, without explicitly The biometric sample included by the user in their
revealing the password in the process” [9]. PAKE protects authentication-attempt message enjoys the same protection
users from phishing and man-in-the-middle attacks, so that against phishing and man-in-the-middle attacks afforded by
users can authenticate with an easily recalled password that PAKE. The user still benefits from mutual authentication,
is never exposed to an attacker. gaining assurance that the intended server has been
accessed instead of an attacker's server.
PAKE protocols achieve mutual authentication without
requiring that users possess digital certificates. By not 3. BIOMETRIC EXTENDED PAKE PROTOCOL
requiring certificates, the cost and operational complexity
of providing mutual authentication solutions can be reduced Biometric authenticated key exchange (BAKE) is an
compared to solutions that rely on a public key extension of the PAKE protocol that provides strong, two-
infrastructure (PKI). By design, PAKE protocols never factor user identity authentication [10]. BAKE extends
expose "the user password to a server impersonation or PAKE by including a user biometric sample, a something-
eavesdropping attack" [5] during a user authentication you-are authenticator, in the PAKE authentication-attempt
attempt. message sent by a user to a server [10]. A claimed user
identity (i.e., an account name) is sent to the server in the
This characteristic of PAKE “prevents off-line dictionary clear. Transfer of the user biometric sample is protected by
attacks, a common password authentication problem.” [9]. encryption under the symmetric key derived from a PAKE
The user's password is input to a Diffie-Hellman key user password, a something-you-know authenticator.
exchange process to derive a symmetric key. This derived
key is used as the basis for ensuring the confidentiality of ICT innovations have led to increased availability and
communications between a user and a server during sophistication of "inexpensive mobile computing devices"
operation of a PAKE protocol. that incorporate "wide varieties of biometric sensors" [5].
"Face, voice, gesture and touch biometric sensors are
The operation of a PAKE protocol, as depicted in Figure 1, becoming commonplace" [5]. This makes it practical for
begins with the user providing a password to a browser or system designers to offer users greater choice that serves
user agent. The password must be preregistered, a value more users. Designers "no longer need to settle on just one
known to the server, so that the user and server can derive biometric technology for authentication" [5]. The ubiquity
the same cryptographic key. The user can assert an identity of sensor-rich ICT devices presents opportunities "to create
claim by presenting an account name to the server in the designs that provide secure authentication and access to
clear, along with their authentication-attempt message web-based services to a greater number of elderly and
encrypted using their password-derived key. disabled users" [5]. ICT innovation is an important enabler
of universal access.
For some biometric technology types, operation of a BAKE
protocol can require two user inputs, one input for each
authentication factor. The user may be required to enter
their password through a keyboard or touch screen, then to
provide a biometric sample using a separate sensor device.
Requiring two user input actions can make two-factor
authentication solutions less convenient and more
Figure 1 – PAKE-based web authentication (Source: Web challenging for some users.
2.0 Security & Privacy (W2SP) 2009)
However, biometric sensor data provides a rich source of
This encrypted message contains a user challenge to the user authentication information. For some biometric
server. If the server a user intends to access receives the technology types, data containing two authentication factors
encrypted message, the stored password for the user can be collected from a biometric sensor with a single user
account can be located, the key needed to decrypt the input. As one example, a microphone can collect a user
message can be derived, the message can be decrypted, and voice sample that contains speaker recognition data, from
the server can respond to the user challenge. If an attacker which a biometric sample can be matched against a
receives the encrypted message, they will not possess the previously stored biometric reference. Using this same
user password needed to derive the key, and they will not voice sample, a speech recognition tool can extract user
be able to decrypt the user message and respond to the user
– 156 –